電腦殺毒掃毒與軟體硬體與網路防毒與比特幣Bitcoin教學
2017 六月 28, 下午 01:29 *
歡迎光臨, 訪客. 請先 登入註冊一個帳號.
您忘了 啟用您的帳號嗎?

請輸入帳號, 密碼以及預計登入時間
 
   首頁   說明 登入 註冊  
頁: 1
  列印  
作者 主題: [比特幣Bitcoin] Bitcoin-Qt 錢包軟體 新版本 0.9.1 (0.9.0版本務必要趕緊更新)  (閱讀 11358 次)
比特幣Bitcoin達世幣DASH苦勞礦工
殺毒協會管理員
殺毒協會 Lv: 5
******
離線 離線

文章: 1,607


個人網站
« 於: 2014 四月 17, 下午 05:35 »

[比特幣Bitcoin] Bitcoin-Qt 錢包軟體 新版本 0.9.1 (0.9.0版本務必要趕緊更新)

 A bug in OpenSSL, used by Bitcoin-Qt/Bitcoin Core, could allow your bitcoins to be stolen. Immediately updating Bitcoin Core to 0.9.1 is required in some cases, especially if you're using 0.9.0.

--------

Bitcoin Core version 0.9.1 is now available from:

https://bitcoin.org/bin/0.9.1/

This is a security update. It is recommended to upgrade to this release as soon as possible.

It is especially important to upgrade if you currently have version 0.9.0 installed and are using the graphical interface OR you are using bitcoind from any pre-0.9.1 version, and have enabled SSL for RPC and have configured allowip to allow rpc connections from potentially hostile hosts.

Please report bugs using the issue tracker at github:

https://github.com/bitcoin/bitcoin/issues

How to Upgrade

If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes for older versions), then run the installer (on Windows) or just copy over /Applications/Bitcoin-Qt (on Mac) or bitcoind/bitcoin-qt (on Linux).

If you are upgrading from version 0.7.2 or earlier, the first time you run 0.9.1 your blockchain files will be re-indexed, which will take anywhere from 30 minutes to several hours, depending on the speed of your machine.

0.9.1 Release notes

No code changes were made between 0.9.0 and 0.9.1. Only the dependencies were changed.

Upgrade OpenSSL to 1.0.1g. This release fixes the following vulnerabilities which can affect the Bitcoin Core software:
CVE-2014-0160 (“heartbleed”) A missing bounds check in the handling of the TLS heartbeat extension can be used to reveal up to 64k of memory to a connected client or server.
CVE-2014-0076 The Montgomery ladder implementation in OpenSSL does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
Add statically built executables to Linux build
已記錄

歡迎自由轉載我的發文, 方便的話 請註明來源為:
http://killvirus.org
------
歡迎光臨 網拍賣場 (賣場雜物有500多樣...)
* Yahoo拍賣: https://tw.bid.yahoo.com/booth/Y5735655021
* 蝦皮拍賣 : https://shopee.tw/add.cc?tab=product
* 露天拍賣: http://class.ruten.com.tw/user/index00.php?s=xxxxxx
(全年無休,每晚24點過後開始出貨, 建議使用[超商取貨付款]!)

FB粉絲團:
https://www.facebook.com/m21000/
---
國際網路金流 Skrill (Moneybookers) 中文註冊申請流程教學
http://saving.cc
頁: 1
  列印  

 
前往:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.21 | SMF © 2006-2008, Simple Machines | Sitemap Valid XHTML 1.0! Valid CSS!